scispace - formally typeset
Journal ArticleDOI

New types of cryptanalytic attacks using related keys

Eli Biham
- 01 Dec 1994 - 
- Vol. 7, Iss: 4, pp 229-246
Reads0
Chats0
TLDR
It is shown that the key-scheduling algorithms of many blockciphers inherit obvious relationships between keys, and use these key relations to attack the blockcips, and that DES is not vulnerable to the related keys attacks.

Content maybe subject to copyright    Report

Citations
More filters
Book ChapterDOI

Secure Message Authentication Against Related-Key Attack

TL;DR: This paper focuses on the part of the related-key setting where the adversary has the ability to query the underlying function on the target key as well as on some related-keys.
Journal ArticleDOI

Differential and linear probabilities of a block-encryption cipher

TL;DR: It is established that the block-encryption algorithm proposed recently by Jakimoski and Kocarev is secure against differential and linear attacks.
Journal Article

Related-Key Rectangle Attack on the Full SHACAL-1

TL;DR: In this article, the first known attack on the full 80-round SHACAL-1 faster than exhaustive key search is presented. The related-key differentials used in the attack are based on transformation of the collision-producing differentials of SHA-1 presented by Wang et al.
Book ChapterDOI

A simple related-key attack on the full SHACAL-1

TL;DR: This paper uses an observation due to Saarinen to present an elegant related-key attack on SHACAL-1, the first successful related-keys key recovery attack on a cipher with varying round constants.
References
More filters
Journal ArticleDOI

Differential cryptanalysis of DES-like cryptosystems

TL;DR: A new type of cryptanalytic attack is developed which can break the reduced variant of DES with eight rounds in a few minutes on a personal computer and can break any reduced variantof DES (with up to 15 rounds) using less than 256 operations and chosen plaintexts.
Book

Cryptography and data security

TL;DR: The goal of this book is to introduce the mathematical principles of data security and to show how these principles apply to operating systems, database systems, and computer networks.
Journal Article

Data encryption standard

TL;DR: Presentation de la norme americaine de codage des donnees informatisees (DES: Data Encryption Standard) permet de proteger lesDonnees selon des criteres qui sont developpes dans ce texte.
Book

Differential Cryptanalysis of the Data Encryption Standard

TL;DR: This book introduces a new cryptographic method, called differential cryptanalysis, which can be applied to analyze cryptosystems, and describes the cryptanalysis of DES, deals with the influence of its building blocks on security, and analyzes modified variants.
Journal ArticleDOI

Cryptography and Computer Privacy

Horst Feistel
- 01 May 1973 -